Countermeasures To Prevent SCADA Cyber Attacks
Countermeasures That Would Have Prevented Scada Cyber Attackvijender R
Countermeasures that would have prevented SCADA cyber attack Vijender Reddy Macharala University of the Cumberland’s Emerging Threats & Countermeas From the SCADA scenario provided, it is apparent that there was a problem in its internet connectivity, out-of-date software and programs, and weak encryption system. Therefore, one of the countermeasures that SCADA would have done to prevent the cyber-attack was to identify any potential threats to their systems. The basic threats like unauthorized access to their computer systems would have been identified and necessary measures taken. According to Shabut et al. (2016), another countermeasures is that SCADA should have mapped out all of its current systems.
This includes proper and precise documentation of the exact system connections to internal networks and to the internet. When they know all exit and entry points, they will have an easy time to identify potential loopholes for security threat and monitor these places or seal the loopholes. The other countermeasure that would prevented the attack was having a network security protocol. According to Shabut et al. (2016), security needs constant attention because one cannot just put a firewall in the system and leave it alone to last for a full year. Instead, the company should have implemented security checks, have reports on security issues and have a standard network security protocol that every employee should abide by.
This should be coupled with security risk assessment, which should be an ongoing process, and they should adapt security measures every time they change the security protocols. The organization should have also implemented restrictions on physical and logical access to the Industry Control System network so that there was an increased accountability to the few individuals who accessed the systems. This would have been coupled with overseeing the network activity 24/7 so that any security incidents and events are detected. References Shabut, A. M., Lwin, K. T., & Hossain, M. A. (2016). Cyber attacks, countermeasures, and protection schemes—A state of the art survey. In the International Conference on Software, Knowledge, Information Management & Applications (SKIMA) (pp. 37-44). IEEE.